Skip to main content
Internet Archive's 25th Anniversary Logo

OpenSecurityTraining.info

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.



rss RSS

278
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
OpenSecurityTraining.info
movies

eye 2,839

favorite 0

comment 0

Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 15,446

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 6,878

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 8,045

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 3,511

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 10,166

favorite 3

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 9,199

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 8,685

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 3,148

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 4,155

favorite 0

comment 0

Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 7,098

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 4,101

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 2,799

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,886

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,777

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 9,372

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 1,490

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 7,785

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 8,302

favorite 2

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 2,932

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 2,824

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,456

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 7,786

favorite 1

comment 0

More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies

eye 2,312

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,462

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,591

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,493

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,466

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,492

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 1,983

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 3,228

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 1,958

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 2,813

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,545

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 1,460

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 2,043

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 2,907

favorite 1

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,826

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,904

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 10,347

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies

eye 3,474

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 2,973

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,915

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 2,468

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,820

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,421

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 1,926

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,148

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 2,649

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies

eye 1,949

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,968

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,859

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,831

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,475

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,565

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 2,213

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 3,196

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies

eye 2,231

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,893

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,794

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,481

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies

eye 1,912

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 1,840

favorite 0

comment 0

Get the class materials to follow along at  http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news  @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
by Veronica Kovah
movies

eye 1,456

favorite 0

comment 0

Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining. This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies

eye 2,979

favorite 0

comment 0

Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...